Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
35 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.1 - Network Architecture and Design
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices
Lelio Campanile
,
Mauro Iacono
,
Fiammetta Marulli
,
Michele Mastroianni
,
Nicola Mazzocca
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.077
28-11-2020
Unique: 1254 | Total: 1933
| Access Period:
1455-1474
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 995 | Total: 1715
| Access Period:
1435-1454
HTML
XML
PDF
Research Article
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
Sławomir Bujnowski
,
Tomasz Marciniak
,
Beata Marciniak
,
Zbigniew Lutowski
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.028
28-04-2020
Unique: 886 | Total: 1566
| Access Period:
528-546
HTML
XML
PDF
Research Article
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures
Robin Mueller-Bady
,
Martin Kappes
,
Inmaculada Medina-Bulo
,
Francisco Palomo-Lozano
10.3217/jucs-025-07-0788
28-07-2019
Unique: 869 | Total: 1482
| Access Period:
788-815
HTML
XML
PDF
Research Article
Impact of Resource Control in Irregular Networks on their Transmission Properties
Sławomir Bujnowski
,
Tomasz Marciniak
,
Beata Marciniak
,
Zbigniew Lutowski
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0591
28-06-2019
Unique: 996 | Total: 1671
| Access Period:
591-610
HTML
XML
PDF
Research Article
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
Łukasz Apiecionek
,
Marcel Großmann
,
Udo Krieger
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0571
28-06-2019
Unique: 1034 | Total: 1734
| Access Period:
571-590
HTML
XML
PDF
Research Article
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
Pir Shah
,
Peer Shah
,
Sadaf Yasmin
,
Zahoor Ur-Rehman
,
Akhlaque Ahmad
,
Yunyoung Nam
,
Seungmin Rho
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1282
28-09-2018
Unique: 930 | Total: 1569
| Access Period:
1282-1305
HTML
XML
PDF
Research Article
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
S. Prabavathy
,
K. Sundarakantham
,
S. Mercy Shalinie
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0577
28-05-2018
Unique: 1061 | Total: 1377
| Access Period:
577-602
HTML
XML
PDF
Research Article
Steganography in VLC Systems
Grzegorz Blinowski
,
Krzysztof Szczypiorski
10.3217/jucs-023-05-0454
28-05-2017
Unique: 760 | Total: 1056
| Access Period:
454-478
HTML
XML
PDF
Research Article
A Semantically Enhanced Service Discovery for MANET
Unai Aguilera
,
Diego López-De-Ipiña
10.3217/jucs-022-07-0896
01-07-2016
Unique: 832 | Total: 1126
| Access Period:
896-920
HTML
XML
PDF
Research Article
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
Shantanu Pal
10.3217/jucs-021-12-1594
01-12-2015
Unique: 623 | Total: 828
| Access Period:
1594-1634
HTML
XML
PDF
Research Article
Maximum Capacity Overlapping Channel Assignment Based on Max-Cut in 802.11 Wireless Mesh Networks
Ming Yang
,
Bo Liu
,
Wei Wang
,
Junzhou Luo
,
Xiaojun Shen
Part of: Collaborative Computing and Applications
10.3217/jucs-020-13-1855
28-11-2014
Unique: 1013 | Total: 1384
| Access Period:
1855-1874
HTML
XML
PDF
1
2
3
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK